Abstract
The technological advancements in the information sharing and the development of many techniques to make the information conveyance easy necessitate a protection methodology that could prevent the personal information that is transmitted from being hacked. Some of the protection methods that have emerged are the cryptography, steganography, watermarking, digital signature etc. As steganography is a popular method of transmitting the covered secret information in order to avoid hacking and the misuse due to its major attributes such as the security, capacity and the robustness. This paper puts forward cryptography incorporated steganography (CICS) to provide a highly secure steganography algorithm for the files of the multiple formats, The performance analysis of the method and the measurement of the parameters such as the PSNR and the SSIM are done to ensure the efficiency of the proffered method.
Publisher
Inventive Research Organization
Reference16 articles.
1. [1] Johnson, Neil F., and Sushil Jajodia. "Exploring steganography: Seeing the unseen." Computer 31, no. 2 (1998): 26-34.
2. [2] Anderson, Ross J., and Fabien AP Petitcolas. "On the limits of steganography." IEEE Journal on selected areas in communications 16, no. 4 (1998): 474-481.
3. [3] Crandall, Ron. "Some notes on steganography." Posted on steganography mailing list (1998): 1-6.
4. [4] Provos, Niels, and Peter Honeyman. "Hide and seek: An introduction to steganography." IEEE security & privacy 1, no. 3 (2003): 32-44.
5. [5] Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier. "An overview of image steganography." In ISSA, pp. 1-11. 2005.
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献